Analysis
-
max time kernel
301s -
max time network
310s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-ja -
resource tags
arch:x64arch:x86image:win10v2004-20240221-jalocale:ja-jpos:windows10-2004-x64systemwindows -
submitted
23/02/2024, 14:04
Behavioral task
behavioral1
Sample
batexe.exe
Resource
win10-20240221-ja
Behavioral task
behavioral2
Sample
batexe.exe
Resource
win10v2004-20240221-ja
General
-
Target
batexe.exe
-
Size
9.4MB
-
MD5
cdc9eacffc6d2bf43153815043064427
-
SHA1
d05101f265f6ea87e18793ab0071f5c99edf363f
-
SHA256
73cc2881ef511788661955a624db9baf40ac16bc63266c5c3bb3fe62b4856d72
-
SHA512
fc6945957e160bf7059c936c329aae438e6c1521e5e43a8434f58058230d89e818eb6ff80331a4b952dbb600b8cc134ecba54e5641bf549723c98f85e993fde6
-
SSDEEP
196608:ERAefrn9wcsTRAJgwusnWpV3h9XxSeEGaT+TKkGzySdUkI56kBIyky:E5Tn9YVwdnWLXxkvLlzkuv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation batexe.exe Key value queried \REGISTRY\USER\S-1-5-21-3844919115-497234255-166257750-1000\Control Panel\International\Geo\Nation b2e.exe -
Executes dropped EXE 2 IoCs
pid Process 1620 b2e.exe 4028 cpuminer-sse2.exe -
Loads dropped DLL 5 IoCs
pid Process 4028 cpuminer-sse2.exe 4028 cpuminer-sse2.exe 4028 cpuminer-sse2.exe 4028 cpuminer-sse2.exe 4028 cpuminer-sse2.exe -
resource yara_rule behavioral2/memory/2520-9-0x0000000000400000-0x000000000393A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2520 wrote to memory of 1620 2520 batexe.exe 91 PID 2520 wrote to memory of 1620 2520 batexe.exe 91 PID 2520 wrote to memory of 1620 2520 batexe.exe 91 PID 1620 wrote to memory of 4756 1620 b2e.exe 92 PID 1620 wrote to memory of 4756 1620 b2e.exe 92 PID 1620 wrote to memory of 4756 1620 b2e.exe 92 PID 4756 wrote to memory of 4028 4756 cmd.exe 96 PID 4756 wrote to memory of 4028 4756 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\batexe.exe"C:\Users\Admin\AppData\Local\Temp\batexe.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\5196.tmp\b2e.exe"C:\Users\Admin\AppData\Local\Temp\5196.tmp\b2e.exe" C:\Users\Admin\AppData\Local\Temp\5196.tmp\b2e.exe C:\Users\Admin\AppData\Local\Temp "C:\Users\Admin\AppData\Local\Temp\batexe.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5F03.tmp\batchfile.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\cpuminer-sse2.execpuminer-sse2.exe -a yespower -o stratum+tcp://yespower.sea.mine.zpool.ca:6234 --userpass=DJXKcu8iouhRppneQL9XbYQ9ovs87y4cYZ:c=doge -t 34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4028
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
960KB
MD5d15ecf39e70d4d6e278b0da9ff36ba87
SHA12139694bf96cc3b6fbfadb8a9c8745b8901bff6a
SHA25604b2e6191d36dccb7b93c7d207ff16c0702cdec9b64b98206f9ffc7dc7633d54
SHA512326cdd9b35aa3dbd39d2fd4a22dd78f732d481f05ef6dca085cd086d8ca91502f3be961b44e5c4bbf2ebf947ffc4f1b4d4703593951fce22acaa418a77741434
-
Filesize
2.8MB
MD5271f1f58742aff0ebf71fc0c3ab4a9cf
SHA163ef4434110ac1ca03865b31406c2921e58bed73
SHA2569f712a59b09b14ca76baae87d480dac0b1c38e4c7eea45140c28997774690279
SHA51218ade3b96c697954d59b8697eadae2cbdd856ebe9885f21d2966041e5dbbe9d9e150954105154f92bd78d1c3100435791b20a105d708b62986cc8910c362dccc
-
Filesize
3.2MB
MD5aff7a438aa20b844ff60b17bf1ab75cb
SHA1bdffe0484da5a800b9f17d132242b4de06300148
SHA2564ab214cf7320cd006a822a0cf0ba04e422342853a2e9f75259f80275fb31b040
SHA51293a82e7640f54a04d3912cefe27fd9b7ed8b6572d8887ded752056c310ca4a29f49d8ba5dd628da4468befd9cca164b4f4a2db6409197c0a6f2a4f65dbafde8b
-
Filesize
136B
MD58ea7ac72a10251ecfb42ef4a88bd330a
SHA1c30f6af73a42c0cc89bd20fe95f9159d6f0756c5
SHA25665e2674fc9b921a76deaf3740603359794c04e059e8937ab36eb931d65f40ec9
SHA512a908979d588625aa24eb81238d07d88a56be5388e1265ebd2fe09889ed807aa9a4af77107e72a843c31acadbe06db0d7f6f6a3c95fb481a71e549e8eb74c2ff0
-
Filesize
1015KB
MD56c6deb43f2230628905fc45ed2615066
SHA10f590a734570eb7a5e9dcb704633b1e922f3b1a8
SHA256b2cd0240f1d37344a6dbd990afa72a03e458872a863276a7e4c45fce640212b6
SHA51230e8d7504421a0659aafcd0c563860d39a45ec0e3cece5859fa67e7cdf18709b26f397cacdf620e51a76a194c6f6bae2f1f815158e9c0c19fbe90f2d58dea644
-
Filesize
1.0MB
MD56f7bfc42f2c3679cd043d33b0fb8e6d1
SHA1eaa03f3300404a9b4755cb0eba211eeb2689bf29
SHA25693423b01aa39f6f67984d6193bc2a108e48260e9fc9afe3937c9ae3f1752b3ea
SHA51251dc699a6a829c3965a40da7580ad24aed7afc27471ae1e6036961cb7a635818a68e5a280bd269b9f2548b0a802bc3627192f5e10932ab6b339de2631c20a628
-
Filesize
836KB
MD5aeab40ed9a8e627ea7cefc1f5cf9bf7a
SHA15e2e8ca2881b9bf9edfa3c4fdcec6da1efa102d8
SHA256218cfc4073bab4eddf0de0804f96b204687311e20a9e97994bff54c9b0e01ee9
SHA512c0a67616fa01fdc351015212a718faf70da6612fbb3ec13da28dd7af9a507c56882fb7c3eea6fbc37d4d63b970157199d16d0756dbe3cb3bc2223e215cb104d8
-
Filesize
704KB
MD5903e2cfee96d720dd5200a922b637d07
SHA1f6d639d7b6bb586abcb5f97b1b212252ed6c85b2
SHA256443ef0fe0e5e9cff04e267b1bbbbc98b547e5bd38a853eb79d06a43a8e7d17f2
SHA512c9c357be28d1d97bd5255d88bc64255f452867407c3aa4c99b286913286780da1204691a0344514f070b8bad391980a88b165eb1e8e9ee97f77ef02eb85071c2
-
Filesize
1.1MB
MD5692de42724ba98221294709c62bef5a0
SHA1bd71b2757b3732f2b89ad2bd2cd152e300b61e3e
SHA256a7aa6e66d4482e56efcd1344b5ef723ac8fc6f5c5434be2b9e5c029a8a0f2b20
SHA512ddb6e3c73bf57e402bfd626e122f1778a06c3633e44564eba999e7cfd661d72742e2d8ba5f9c57a6b8de98e43bd476ad26cd3871928a1759c834c6763cfef599
-
Filesize
1.1MB
MD5a98c0a5bc2dcfaf0640e9ef1e9db3836
SHA159d8d9c9ebc39eda1bc78e487acd4dcefadbd6a0
SHA2567f9875257e2e1e1bb2129cbe96c16fc297c94b3c05a4a03dd171fbed8d3e1cce
SHA512e715fb9fc18ec35ec5ace72a6a2da97aa9fb4b26dffde2f7cac0154f438db4ed1f826d567bb381503a51933e7e2503557ac55902f91793101a42be34376ca1fa
-
Filesize
1.1MB
MD54706d3506f0ad1a8e24c105632d1de45
SHA1493b82c7924748e1dc4826a5ad520284fd9858cd
SHA256e8375db78a70af9f799630dae59c4c2eb45dfc0e306676fee4ce0471666e84df
SHA512b10c3b2d841392e6e2650793d07da6a65a2cd12d833b238245781b299fa68a6d41edbe493e4567c0b2dc82c761c3807998ef41367876f62d942773ae0f982a3b
-
Filesize
112KB
MD5adb234c131031005549d7fd97a51a4ec
SHA19e9622d7eb31fb016b3f15f42b633fe6d1fe3463
SHA256ba8559d1832ee3fd3b4d185f430a3ab8110aaa4dac72da5baeebac7901529a59
SHA5123a1aa5262669c69358e65b913aac98535e39532cf9094e9e6763f88ba2085037ca15dcbf0bdc5ea154c39f4de7a109af148d9a3a0fa1c3d1a69959e61b3ab847
-
Filesize
143KB
MD53f47da019d94417e3a434233953c96d4
SHA14bee8ee0a17eadb692f97d5c2daee5ae00bd4930
SHA2566e6dd656b72f1c42440e933860b9118746213d88c23becef8e7c870dba672914
SHA512b5db763c3ca6c3481f567469685bd4bd19231d582f83809df7c728896861a4c603bbcfadec30254e0e32fd30cfe618fc90e7618a93f79e3fb9838ae578270b78
-
Filesize
606KB
MD5585efec1bc1d4d916a4402c9875dff75
SHA1d209613666ccac9d0ddab29a3bc59aa00a0968fa
SHA2562f9984c591a5654434c53e8b4d0c5c187f1fd0bab95247d5c9bc1c0bd60e6232
SHA512b93163cba4601ed999a7a7d1887113792e846c36850c6d84f2d505727dc06524bb959469f9df12928769f4535dc6074a6b3599b788a4844353e466742ce1e770